{ config, ... }: { imports = [ ./hardware-configuration.nix ../../config/base.nix ../../config/stylix.nix ]; my = import ./toggles.nix; sops.secrets."vps/home/private".sopsFile = ../../secrets/wireguard.yaml; networking = let ports = [ 2049 # idk 9999 # stash 8384 # syncthing ]; in { hostName = "server"; firewall = { allowedTCPPorts = ports; allowedUDPPorts = ports; }; wireguard.interfaces.wg0 = { ips = [ "10.77.0.2/32" ]; privateKeyFile = config.sops.secrets."vps/home/private".path; peers = [ { publicKey = "dFbiSekBwnZomarcS31o5+w6imHjMPNCipkfc2fZ3GY="; endpoint = "51.222.141.104:51820"; allowedIPs = [ "10.77.0.1/32" ]; persistentKeepalive = 25; } ]; }; }; nix = let featuresList = [ "nixos-test" "benchmark" "big-parallel" "kvm" "gccarch-znver3" "gccarch-skylake" "gccarch-alderlake" ]; in { settings.cores = 6; buildMachines = [ { hostName = "workstation"; system = "x86_64-linux"; sshUser = "nixremote"; maxJobs = 12; speedFactor = 1; supportedFeatures = featuresList; } ]; }; users = { groups.nixremote.gid = 555; users = { # jawz.packages = [ pkgs.stash ]; nixremote = { isNormalUser = true; createHome = true; group = "nixremote"; home = "/var/nixremote/"; openssh.authorizedKeys.keyFiles = [ ../../secrets/ssh/ed25519_nixworkstation.pub ../../secrets/ssh/ed25519_nixminiserver.pub ]; }; }; }; services.btrfs.autoScrub = { enable = true; fileSystems = [ "/" "/srv/pool" ]; }; }